Login / Signup
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.
Claude Carlet
Sylvain Guilley
Sihem Mesnager
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
white box
black box
desired output
input data
input variables
multiple output
cellular automata
source code
hidden units
multiple input
machine learning
information systems
case study
countermeasures
test data
information security